{"id":4797,"date":"2023-10-05T10:34:44","date_gmt":"2023-10-05T10:34:44","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=4797"},"modified":"2023-10-11T08:47:20","modified_gmt":"2023-10-11T08:47:20","slug":"emerging-threats-to-critical-infrastructure-staying-ahead","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/","title":{"rendered":"Emerging Threats to Critical Infrastructure: Staying Ahead"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><em>Summary: Although organizations and federal agencies recognize the importance of critical infrastructure to the national economy and the potential impact of a successful cyberattack, the US Government Accountability Office has identified many security gaps that are rooted primarily in the lack of coordination and collaboration. How can cybersecurity professionals help alleviate and secure critical infrastructure?<\/em><\/p>\n<p>Recent attacks on the Irish Health Service Executive (HSE), Colonial Pipeline, and JBS Food serve as a warning of the significant threat posed by ransomware to the essential systems, networks, and assets that support a country&#8217;s society and economy. These critical national infrastructure components include educational institutions, public health facilities, energy grids, transportation systems, and water treatment plants.<\/p>\n<p>These threats can also prove to be existential ones. St. Margaret\u2019s Health Hospital in Spring Valley, Illinois, announced on June 12, 2023, that it <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/illinois-hospital-links-closure-ransomware-attack-rcna85983\" target=\"_blank\" rel=\"noopener\">would shut down<\/a> because of the financial spiral caused by a devastating cyberattack in 2021.<\/p>\n<h2>\u201cWill attackers adapt faster than we can evolve?\u201d<\/h2>\n<p>The risk of security breaches in critical infrastructure has increased significantly in recent years. Integrating digital technology into older systems has made these facilities more vulnerable to attacks. The threat landscape constantly changes, and malicious actors have recognized the potential financial benefits of targeting these industries. These attacks are becoming more sophisticated, with state-sponsored and independent hackers shifting their focus from IT to operational technology (OT) environments. The <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-digital-defense-report-2022\" target=\"_blank\" rel=\"noopener\">2022 Microsoft Digital Defense Report<\/a> reveals that cyberattacks on businesses in IT, finance, transportation, and communication infrastructures accounted for 40% of all incidents in 2022, up from 20% in 2021.<\/p>\n<p>Ian Bramson, global head of industrial cybersecurity at ABS Group, <a href=\"https:\/\/www.forbes.com\/sites\/forbesbooksauthors\/2023\/01\/10\/critical-infrastructure-why-its-the-new-target-for-cybercriminals-a-discussion-with-ian-bramson\/\">says<\/a> that the real question for governments and cybersecurity professionals is, \u201cWill attackers adapt faster than we can evolve?\u201d<\/p>\n<h2>57% of GAO recommendations have not been implemented<\/h2>\n<p>Even though the discussions between operators of facilities and federal bodies on protecting critical national infrastructure have intensified, the US Government Accountability Office (GAO) sounds the alarm. \u201cWe&#8217;ve made 106 public recommendations in this area since 2010. Nearly 57% of those recommendations had not been implemented as of December 2022,\u201d <a href=\"https:\/\/www.gao.gov\/products\/gao-23-106441\" target=\"_blank\" rel=\"noopener\">reads a recent report<\/a>. \u201cUntil these are fully implemented, federal agencies will be more limited in their ability to protect private and sensitive data entrusted to them.\u201d<\/p>\n<p>Which are the sectors that are primarily at risk, according to GAO?<\/p>\n<h3>Energy grids<\/h3>\n<p>The growing connectivity of industrial control systems (ICS) poses a significant risk to the distribution systems of the US grid, making them increasingly vulnerable to cyberattacks. As sensitive processes and physical functions become exposed to the internet, malicious actors use various methods to access these systems, potentially disrupting operations.<\/p>\n<p>These methods include:<\/p>\n<ul>\n<li>Spearphishing emails that contain links or attachments with harmful code to infiltrate the corporate network.<\/li>\n<li>Exploiting insecure VPN connections to gain unauthorized access to ICS systems and networks.<\/li>\n<li>Compromising IoT devices attached to ICS systems with direct internet access.<\/li>\n<li>Attacking the ICS supply chain to manipulate hardware or software components before reaching the end industry.<\/li>\n<\/ul>\n<p>While the Department of Energy (DOE) has developed plans to mitigate these threats, the plans have not addressed the supply chain vulnerabilities. Therefore, GAO has identified a security gap that could compromise the security, safety, and reliability of the US electric distribution systems.<\/p>\n<h3>Education<\/h3>\n<p>K-12 schools have experienced significant educational impact due to cybersecurity incidents like ransomware attacks. Officials from state and local entities report that the loss of learning following a cyberattack ranged from 3 days to 3 weeks, and recovery time ranged from 2 to 9 months. Even though the <a href=\"https:\/\/www.dhs.gov\/xlibrary\/assets\/nipp_consolidated_snapshot.pdf\" target=\"_blank\" rel=\"noopener\">National Infrastructure Protection Plan<\/a> established the Department of Education as the agency responsible for coordinating all actions with CISA and FBI to develop a cybersecurity plan, the federal agencies had no interaction with each other. As a result, the cybersecurity needs of the education sector have not been addressed, and schools remain largely unprotected against emerging cyber threats.<\/p>\n<h3>Communications Sector<\/h3>\n<p>The communications sector is a crucial part of the US economy, but it is vulnerable to physical, cyber, and human threats that could disrupt local, regional, and national networks. Despite its significance, CISA has yet to evaluate the effectiveness of its programs and services that help ensure the security and resilience of the communications sector. Such an assessment would enable CISA to identify which programs and services are most beneficial in supporting the sector&#8217;s security and resilience.<\/p>\n<h3>Oil and Gas<\/h3>\n<p>The safety and security of offshore oil and gas infrastructure face an ever-increasing threat from cybercriminals, vulnerabilities, and potential impacts. Unfortunately, the previous initiatives by the Bureau of Safety and Environmental Enforcement failed to produce any concrete action and didn&#8217;t include a cybersecurity strategy. To address this issue, the Bureau hired a cybersecurity specialist to lead the risk-mitigation effort in 2022. However, the initiative was put on hold until the specialist had sufficient knowledge of the relevant issues. Developing and implementing an appropriate strategy promptly is crucial to ensure the safety and security of offshore oil and gas infrastructure.<\/p>\n<h2>Coordination and collaboration are lacking<\/h2>\n<p>Reading GAO\u2019s recommendations, it is apparent that there is a lack of coordination between responsible entities and federal agencies. For example, GAO recommends that:<\/p>\n<ul>\n<li>\u201cDOE coordinates with the Department of Homeland Security (DHS), states, and industry to more fully address risks to the grid\u2019s distribution systems from cyberattacks.\u201d<\/li>\n<li>\u201cEducation establishes a collaborative mechanism, such as an applicable government coordinating council, to coordinate cybersecurity efforts.\u201d<\/li>\n<\/ul>\n<p>Lack of coordination is also evident when addressing ransomware attacks. Although CISA, FBI, and Secret Service coordinated and demonstrated coordination on a joint ransomware website, guidance, and alerts, they faced challenges related to awareness, outreach, and communication. As a result, GAO recommends that CISA improves the coordination and sharing of threat information with respective stakeholders.<\/p>\n<p>Lack of coordination and collaboration may indicate a lack of perspective and understanding of the threat landscape. A possible cause is that cybersecurity professionals fail to speak the business language and flood the boardroom with too much technical information. Unfortunately, this is information that executives do not understand, lacking, thus, the capacity to reach informed decisions.<\/p>\n<h2>Present leadership with a compelling narrative<\/h2>\n<p>To get leadership involved in OT and IT cybersecurity, it&#8217;s crucial to tell a compelling story. Cybersecurity professionals should explain cyber concepts in a way that&#8217;s easy to understand. For instance, on the OT side, it&#8217;s essential to clarify that the threat to OT goes beyond stealing data. Threat actors aim to disrupt operations, which can impact facilities&#8217; physical security, employee safety, and local communities.<\/p>\n<p>It&#8217;s also important to show how cyberattacks can affect a company&#8217;s revenue and business risk. For instance, a cyber leader at a power station may want to emphasize how a cyberattack can affect a facility&#8217;s ability to generate and distribute power safely. Additionally, it is crucial to demonstrate the measures taken to detect and respond to incidents. By doing so, cyber professionals can show how their actions and policies can minimize the impact of an attack.<\/p>\n<p>By simplifying cybersecurity concepts, board-level leaders can better understand the right questions to ask, leading to productive conversations with cyber specialists.<\/p>\n<p><a href=\"https:\/\/itegriti.com\/kw022024\/\">ITEGRITI<\/a> has deep experience across critical infrastructure cybersecurity programs, compliance, risk, and audit.\u00a0<a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">Contact us<\/a> today to learn how we can leverage this experience to help you accomplish your cybersecurity goals.<\/p>\n<\/div><script src=https:\/\/platform.linkedin.com\/in.js type=\"text\/javascript\"> lang: en_US<\/script>\n<script type=\"IN\/FollowCompany\" data-id=\"10831622\" data-counter=\"bottom\"><\/script>\n<\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":4802,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2180],"tags":[2188,2193,2208,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threats to Critical Infrastructure: Staying Ahead<\/title>\n<meta name=\"description\" content=\"With the emerging threats, how can cybersecurity professionals help alleviate and secure critical infrastructure?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threats to Critical Infrastructure: Staying Ahead\" \/>\n<meta property=\"og:description\" content=\"With the emerging threats, how can cybersecurity professionals help alleviate and secure critical infrastructure?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-05T10:34:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-11T08:47:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Emerging Threats to Critical Infrastructure: Staying Ahead\",\"datePublished\":\"2023-10-05T10:34:44+00:00\",\"dateModified\":\"2023-10-11T08:47:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/\"},\"wordCount\":1484,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\",\"Healthcare Sector\",\"Water Sector\"],\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/\",\"name\":\"Emerging Threats to Critical Infrastructure: Staying Ahead\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png\",\"datePublished\":\"2023-10-05T10:34:44+00:00\",\"dateModified\":\"2023-10-11T08:47:20+00:00\",\"description\":\"With the emerging threats, how can cybersecurity professionals help alleviate and secure critical infrastructure?\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threats to Critical Infrastructure: Staying Ahead\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Emerging Threats to Critical Infrastructure: Staying Ahead","description":"With the emerging threats, how can cybersecurity professionals help alleviate and secure critical infrastructure?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threats to Critical Infrastructure: Staying Ahead","og_description":"With the emerging threats, how can cybersecurity professionals help alleviate and secure critical infrastructure?","og_url":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2023-10-05T10:34:44+00:00","article_modified_time":"2023-10-11T08:47:20+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png","type":"image\/png"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Emerging Threats to Critical Infrastructure: Staying Ahead","datePublished":"2023-10-05T10:34:44+00:00","dateModified":"2023-10-11T08:47:20+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/"},"wordCount":1484,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png","keywords":["Cybersecurity","Energy Sector","Healthcare Sector","Water Sector"],"articleSection":["Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/","url":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/","name":"Emerging Threats to Critical Infrastructure: Staying Ahead","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png","datePublished":"2023-10-05T10:34:44+00:00","dateModified":"2023-10-11T08:47:20+00:00","description":"With the emerging threats, how can cybersecurity professionals help alleviate and secure critical infrastructure?","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/10\/152.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Emerging Threats to Critical Infrastructure: Staying Ahead"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4797"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=4797"}],"version-history":[{"count":4,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4797\/revisions"}],"predecessor-version":[{"id":4803,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4797\/revisions\/4803"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/4802"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=4797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=4797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=4797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}